Authentication via wireless networks

Computer Science – Other Computer Science

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia, 2006

Scientific paper

Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But by using novel technologies like mobile computing and wireless networking, it is possible to avoid carrying multitude of ID cards or remembering a number of PIN codes. Article shows how to efficiently authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA using commonplace AES (Rijndel) or MD5 encryption. This method can be implemented on many types of mobile devices like Pocket PC PDA with Windows CE (Windows Mobile 2003) real-time operating system, or any other customized OS, so we will explain all components and key features of such basic system.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Authentication via wireless networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Authentication via wireless networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication via wireless networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-196315

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.